Data breaches wouldn’t be a big deal if we prepared better for the inevitable

Read Paul Muschick’s article about how companies can prepare themselves for inevitable data breach on The Morning Call : It’s time to get over the Equifax data breach. That sounds strange coming from the Watchdog, but hear me out. While there’s no excuse for the bone-headed security breakdown at Equifax that potentially exposed 145 million Americans’ most-sensitive […]

How can a hypervisor deployment avoid security risks?

Read Judith Myerson explain how hypervisor deployment can help companies security risks on Tech Target : The risks of a hypervisor deployment include faulty implementation of hypervisor modules and configuration errors. These risks stem from the multiple ways the hypervisor virtualizes hardware resources to execute multiple computer stacks or virtual machines (VMs). Read her full article […]

5 Ways To Improve Your Small Business Cybersecurity

Read Mike Kappel list five ways in which small and medium businesses can improve their cyber security on Forbes : Do you think your small business is at risk of being hacked? An overwhelming 87% of small business owners don’t think so. But, your business might be at risk more than you realize. About half of […]

Cyber and physical security are inseparable

Read why Beverley Head says that cyber and physical security are inseparable on Computer Weekly : A comprehensive approach that brings together analyses of people, places and patterns might be the best hope for establishing secure environments – both online and in the physical world. Read her full article here.

Who’s really responsible for cloud security?

Read Colby Proffitt’s article about who should be responsible for cloud security on GCN : It’s been seven years since the Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress. While the cloud brings benefits, security remains a […]

Understanding data breaches

The proliferation of digital technology in the last two decades has brought with it a slew of various cyber-threats, especially cybercrime, the most common example of which is data breaches. Read what professors and security researchers have to say about data breach on The Battalion.

Data Helps Businesses Decide Where To Spend Cybersecurity Dollars

Read Don Bradley’s article about how data analytics helps businesses optimize their cyber security budget on Forbes : Around the world, cybersecurity teams have plenty to do — but they lack the money to do it. Ironically, when they are funded, they often don’t know how to spend it effectively. Analytics might help. Read his […]

The Internet of Things could easily be the Internet of Threats

Read why  Aseem Ahmed says that Internet of Things could easily become a cyber trap for businesses on Economic Times : The Internet of Things (IoT), unlike SMAC (Social Mobile Analytics Cloud), moved faster from being an industry buzzword to reality. However, what needs to be examined is whether businesses are prepared to fully leverage […]

Maritime Cyber Security: The Wrong Formula

Read why says that perimeter defense is a wrong strategy for maritime cyber security on Marine Link : For many industries, cyber security is about target hardening and perimeter defense. This makes sense, as cyber security is implemented in much the same way that physical security is implemented. We often think of it in terms […]

Fred Kwong: The Psychology of Being a CISO

When Fred Kwong’s friends had Nintendo game systems, his home had a PC. The household computer sparked an early interest in technology, which persisted throughout the long, winding, sometimes blocked road that eventually led to his role as CISO of Delta Dental. Read Fred Kwong of Delta Dental explains his approach to cybersecurity and how […]